* How to identify the infected machine based on network traffic.
* Analyze the infection chain, including compromised websites and Exploit Kit servers.
* Extract details like malicious script URLs and potential exploit file hashes.
* Identify the exploited vulnerability (CVE).
* Understand the role of redirect URLs in exploit kit attacks.
This lab allows you flexibility to use your preferred tool. Here are some options mentioned:
* Wireshark
* Zui/Brim
* NetworkMiner
The lab provides ten challenge questions that will guide you through the investigation. Each question includes a detailed walkthrough explaining how to find the answer using the PCAP file and your chosen tool.
* Identifying the Infected Machine:&n